Chapter 1: Computer Forensics and Investigations as a Profession

Size: px
Start display at page:

Download "Chapter 1: Computer Forensics and Investigations as a Profession"

Transcription

1 Chapter 1: Computer Forensics and Investigations as a Profession Download Full Test Bank for guide to computer forensics and investigations 5th edition at TRUE/FALSE 1. By the 1970s, electronic crimes were increasing, especially in the financial sector. T PTS: 1 REF: 6 2. To be a successful computer forensics investigator, you must be familiar with more than one computing platform. T PTS: 1 REF: 8 3. Computer investigations and forensics fall into the same category: public investigations. F PTS: 1 REF: The law of search and seizure protects the rights of all people, excluding people suspected of crimes. F PTS: 1 REF: After a judge approves and signs a search warrant, it s ready to be executed, meaning you can collect evidence as defined by the warrant. T PTS: 1 REF: 15 MULTIPLE CHOICE 1. The FBI was formed in 1984 to handle the increasing number of cases involving digital evidence. a. Federal Rules of Evidence (FRE) b. Department of Defense Computer Forensics Laboratory (DCFL) c. DIBS d. Computer Analysis and Response Team (CART) D PTS: 1 REF: 2 2. involves recovering information from a computer that was deleted by mistake or lost during a power surge or server crash, for example. a. Data recovery c. Computer forensics b. Network forensics d. Disaster recovery A PTS: 1 REF: 4 3. involves preventing data loss by using backups, uninterruptible power supply (UPS) devices, and off-site monitoring. a. Computer forensics c. Disaster recovery b. Data recovery d. Network forensics

2 C PTS: 1 REF: 4 4. The group manages investigations and conducts forensic analysis of systems suspected of containing evidence related to an incident or a crime. a. network intrusion detection c. incident response b. computer investigations d. litigation B PTS: 1 REF: 5 5. By the early 1990s, the introduced training on software for forensics investigations. a. IACIS c. CERT b. FLETC d. DDBIA A PTS: 1 REF: 6 6. In the Pacific Northwest, meets monthly to discuss problems that law enforcement and corporations face. a. IACIS c. FTK b. CTIN d. FLETC B PTS: 1 REF: 8 7. In a case, a suspect is tried for a criminal offense, such as burglary, murder, or molestation. a. corporate c. criminal b. civil d. fourth amendment C PTS: 1 REF: In general, a criminal case follows three stages: the complaint, the investigation, and the. a. litigation c. blotter b. allegation d. prosecution D PTS: 1 REF: Based on the incident or crime, the complainant makes a(n), an accusation or supposition of fact that a crime has been committed. a. litigation c. blotter b. allegation d. prosecution B PTS: 1 REF: In a criminal or public case, if you have enough information to support a search warrant, the prosecuting attorney might direct you to submit a(n). a. blotter c. litigation report b. exhibit report d. affidavit D PTS: 1 REF: It s the investigator s responsibility to write the affidavit, which must include (evidence) that support the allegation to justify the warrant. a. litigation c. exhibits b. prosecution d. reports C PTS: 1 REF: The affidavit must be under sworn oath to verify that the information in the affidavit is true.

3 a. notarized c. recorded b. examined d. challenged A PTS: 1 REF: Published company policies provide a(n) for a business to conduct internal investigations. a. litigation path c. line of allegation b. allegation resource d. line of authority D PTS: 1 REF: A usually appears when a computer starts or connects to the company intranet, network, or virtual private network (VPN) and informs end users that the organization reserves the right to inspect computer systems and network traffic at will. a. warning banner c. line of authority b. right of privacy d. right banner A PTS: 1 REF: A(n) is a person using a computer to perform routine tasks other than systems administration. a. complainant c. end user b. user banner d. investigator C PTS: 1 REF: Without a warning banner, employees might have an assumed when using a company s computer systems and network accesses. a. line of authority c. line of privacy b. right of privacy d. line of right B PTS: 1 REF: In addition to warning banners that state a company s rights of computer ownership, businesses should specify a(n) who has the power to conduct investigations. a. authorized requester c. line of right b. authority of line d. authority of right A PTS: 1 REF: Most computer investigations in the private sector involve. a. abuse c. Internet abuse b. misuse of computing assets d. VPN abuse B PTS: 1 REF: Corporations often follow the doctrine, which is what happens when a civilian or corporate investigative agent delivers evidence to a law enforcement officer. a. silver-tree c. silver-platter b. gold-tree d. gold-platter C PTS: 1 REF: Your as a computer investigation and forensics analyst is critical because it determines your credibility. a. professional policy c. line of authority b. oath d. professional conduct

4 D PTS: 1 REF: Maintaining means you must form and sustain unbiased opinions of your cases. a. confidentiality c. integrity b. objectivity d. credibility B PTS: 1 REF: 21 COMPLETION 1. involves obtaining and analyzing digital information for use as evidence in civil, criminal, or administrative cases. Computer forensics PTS: 1 REF: 2 2. The to the U.S. Constitution (and each state s constitution) protects everyone s rights to be secure in their person, residence, and property from search and seizure. Fourth Amendment PTS: 1 REF: 2 3. The term refers to large corporate computing systems that might include disparate or formerly independent systems. enterprise network environment PTS: 1 REF: 4 4. When you work in the group, you test and verify the integrity of standalone workstations and network servers. vulnerability assessment and risk management PTS: 1 REF: 5 5. The provides a record of clues to crimes that have been committed previously. police blotter PTS: 1 REF: 13 MATCHING Match each item with a statement below: a. Computer forensics f. HTCIA b. Network forensics g. Affidavit c. Litigation h. Industrial espionage d. Xtree Gold i. Line of authority e. Case law

5 1. the legal process of proving guilt or innocence in court 2. recognizes file types and retrieves lost or deleted files 3. investigates data that can be retrieved from a computer s hard disk or other storage media 4. sworn statement of support of facts about or evidence of a crime that is submitted to a judge to request a search warrant before seizing evidence 5. allows legal counsel to use previous cases similar to the current one because the laws don t yet exist 6. specifies who has the legal right to initiate an investigation, who can take possession of evidence, and who can have access to evidence 7. organization that exchanges information about techniques related to computer investigations and security 8. yields information about how a perpetrator or an attacker gained access to a network 9. involves selling sensitive or confidential company information to a competitor 1. C PTS: 1 REF: 5 2. D PTS: 1 REF: 6 3. A PTS: 1 REF: 3 4. G PTS: 1 REF: E PTS: 1 REF: 8 6. I PTS: 1 REF: F PTS: 1 REF: 9 8. B PTS: 1 REF: 3 9. H PTS: 1 REF: 15 SHORT ANSWER 1. Briefly describe the triad that makes up computer security. Investigators often work as a team to make computers and networks secure in an organization. The computer investigations function is one of three in a triad that makes up computing security. In an enterprise network environment, the triad consists of the following parts: * Vulnerability assessment and risk management * Network intrusion detection and incident response * Computer investigations PTS: 1 REF: 4 2. Briefly describe the main characteristics of public investigations. Public investigations involve government agencies responsible for criminal investigations and prosecution. Government agencies range from local, county, and state or provincial police departments to federal regulatory enforcement agencies. These organizations must observe legal guidelines such as Article 8 in the Charter of Rights of Canada, the Criminal Procedures Act of the Republic of Namibia, and U.S. Fourth Amendment issues related to search and seizure rules. PTS: 1 REF: Briefly describe the main characteristics of private investigations.

6 Private or corporate investigations deal with private companies, non-law-enforcement government agencies, and lawyers. These private organizations aren t governed directly by criminal law or Fourth Amendment issues, but by internal policies that define expected employee behavior and conduct in the workplace. Private corporate investigations also involve litigation disputes. Although private investigations are usually conducted in civil cases, a civil case can escalate into a criminal case, and a criminal case can be reduced to a civil case. If you follow good forensics procedures, the evidence found in your investigations can easily make the transition between civil and criminal cases. PTS: 1 REF: What questions should an investigator ask to determine whether a computer crime was committed? In a criminal case, a suspect is tried for a criminal offense, such as burglary, murder, or molestation. To determine whether there was a computer crime, an investigator asks questions such as the following: What was the tool used to commit the crime? Was it a simple trespass? Was it a theft, a burglary, or vandalism? Did the perpetrator infringe on someone else s rights by cyberstalking or e- mail harassment? PTS: 1 REF: What are the three levels of law enforcement expertise established by CTIN? To differentiate the training and experience law officers have, CTIN has established three levels of law enforcement expertise: * Level 1 Acquiring and seizing digital evidence, normally performed by a street police officer. * Level 2 Managing high-tech investigations, teaching investigators what to ask for, and understanding computer terminology and what can and can t be retrieved from digital evidence. The assigned detectives usually handle the case. * Level 3 Specialist training in retrieving digital evidence, normally performed by a data recovery or computer forensics expert, network forensics expert, or Internet fraud investigator. This person might also be qualified to manage a case, depending on his or her background. PTS: 1 REF: What are some of the most common types of corporate computer crime? Corporate computer crimes can involve harassment, falsification of data, gender and age discrimination, embezzlement, sabotage, and industrial espionage, which involves selling sensitive or confidential company information to a competitor. Anyone with access to a computer can commit these crimes. PTS: 1 REF: What is embezzlement? Embezzlement is a common computer crime, particularly in small firms. Typically, the owner is busy and trusts one person, such as the office manager, to handle daily transactions. When the office manager leaves, the owner discovers that some clients were overbilled or others were not billed at all, and money is missing. Rebuilding the paper and electronic trail can be tedious. Collecting enough evidence to press charges might be beyond the owner s capabilities.

7 PTS: 1 REF: Briefly describe corporate sabotage. Corporate sabotage is most often committed by a disgruntled employee. The employee decides to take a job at a competitor s firm and collects critical files on a disk or thumb drive before leaving. This type of crime can also lead to industrial espionage, which increases every year. PTS: 1 REF: What text can be used in internal warning banners? Depending on the type of organization, the following text can be used in internal warning banners: * Access to this system and network is restricted. * Use of this system and network is for official business only. * Systems and networks are subject to monitoring at any time by the owner. * Using this system implies consent to monitoring by the owner. * Unauthorized or illegal users of this system or network will be subject to discipline or prosecution. PTS: 1 REF: Mention examples of groups that should have direct authority to request computer investigations in the corporate environment. Examples of groups that should have direct authority to request computer investigations in the corporate environment include the following: * Corporate Security Investigations * Corporate Ethics Office * Corporate Equal Employment Opportunity Office * Internal Auditing * The general counsel or Legal Department PTS: 1 REF: 18

Policies and Procedures No. 56

Policies and Procedures No. 56 1255 Imperial Avenue, Suite 1000 San Diego, CA 92101-7490 619/231-1466 FAX 619/234-3407 Policies and Procedures No. 56 SUBJECT: Enacted: 9/13/07 FRAUD IN THE WORKPLACE PURPOSE: To establish policies and

More information

Fraud. Original Implementation: January 28, 1997 Last Revision: November 2, 2015 INTRODUCTION

Fraud. Original Implementation: January 28, 1997 Last Revision: November 2, 2015 INTRODUCTION Fraud Original Implementation: January 28, 1997 Last Revision: November 2, 2015 INTRODUCTION This policy establishes procedures and responsibilities for detecting, reporting, and resolving instances of

More information

Ethics Policy. Administrative Code under Part 3, Chapter 9, Article 1, Section 1.4

Ethics Policy. Administrative Code under Part 3, Chapter 9, Article 1, Section 1.4 Ethics Policy Administrative Code under Part 3, Chapter 9, Article 1, Section 1.4 1.4 Administration and Ethics Committee The Administration and Ethics Committee is the committee that investigates and/or

More information

DATA PROCESSING AGREEMENT. between [Customer] (the "Controller") and LINK Mobility (the "Processor")

DATA PROCESSING AGREEMENT. between [Customer] (the Controller) and LINK Mobility (the Processor) DATA PROCESSING AGREEMENT between [Customer] (the "Controller") and LINK Mobility (the "Processor") Controller Contact Information Name: Title: Address: Phone: Email: Processor Contact Information Name:

More information

GUEST WIFI NETWORK. Terms and Conditions and Acceptable Use Protocol

GUEST WIFI NETWORK. Terms and Conditions and Acceptable Use Protocol GUEST WIFI NETWORK Terms and Conditions and Acceptable Use Protocol PLEASE READ THESE TERMS AND CONDITIONS AND THE ACCEPTABLE USE PROTOCOL CAREFULLY BEFORE USING THE GUEST WIFI NETWORK SERVICE TERMS AND

More information

PUBLIC INFORMATION FUNCTION

PUBLIC INFORMATION FUNCTION AOM CHAPTER A 106 PUBLIC INFORMATION FUNCTION Table of Contents I. INTRODUCTORY DISCUSSION II. POLICY III. COORDINATION & CONTROL [ 54.1.1 ] IV. RELEASE OF INFORMATION PROCEDURES V. MEDIA ACCESS TO CRIME

More information

PUBLISHED AS A PUBLIC SERVICE BY THE OFFICE OF DISCIPLINARY COUNSEL

PUBLISHED AS A PUBLIC SERVICE BY THE OFFICE OF DISCIPLINARY COUNSEL This information has been prepared for persons who wish to make or have made a complaint to The Lawyer Disciplinary Board about a lawyer. Please read it carefully. It explains the disciplinary procedures

More information

Who s who in a Criminal Trial

Who s who in a Criminal Trial Mock Criminal Trial Scenario Who s who in a Criminal Trial ACCUSED The accused is the person who is alleged to have committed the criminal offence, and who has been charged with committing it. Before being

More information

Law, Investigations, and Ethics. Ed Crowley

Law, Investigations, and Ethics. Ed Crowley Law, Investigations, and Ethics Ed Crowley ISC2 Key Areas of Knowledge Understand legal issues that pertain to information security internationally. 1. Computer crime 2. Licensing and intellectual property

More information

RESOLUTION NOW, THEREFORE, the Board of Directors does hereby RESOLVE and ORDER as follows:

RESOLUTION NOW, THEREFORE, the Board of Directors does hereby RESOLVE and ORDER as follows: RESOLUTION 2-12 A RESOLUTION OF THE BOARD OF DIRECTORS OF THE TEHACHAPI-CUMMINGS COUNTY WATER DISTRICT ADOPTING A POLICY REGARDING FRAUD PREVENTION, DETECTION AND DISCIPLINARY ACTION WHEREAS, in the course

More information

GILLESPIE COUNTY FRAUD PREVENTION AND DETECTION POLICY

GILLESPIE COUNTY FRAUD PREVENTION AND DETECTION POLICY GILLESPIE COUNTY FRAUD PREVENTION AND DETECTION POLICY INTRODUCTION Gillespie County (County) is committed to the deterrence, detection and correction of misconduct and dishonesty to prevent fraud. Like

More information

MC/15/89 Anti-Fraud Policy and Fraud Response Action Plan

MC/15/89 Anti-Fraud Policy and Fraud Response Action Plan Methodist Council Anti Fraud Policy and Fraud Response Action Plan MC/15/89 Contact Name and Details Status of Paper Action Required Resolution Nick Moore, Head of Support Services, mooren@methodistchurch.org.uk

More information

Crisis Management Initial Response Checklist

Crisis Management Initial Response Checklist . Memorandum TO: FROM: General Counsel Chief Compliance Officer Joshua Berman and Gil Soffer DATE: June 15, 2010 SUBJECT: Crisis Management Initial Response Checklist The subpoena and communications you

More information

Global Conditions (applies to all components):

Global Conditions (applies to all components): Conditions for Use ES&S The Testing Board would also recommend the following conditions for use of the voting system. These conditions are required to be in place should the Secretary approve for certification

More information

Chapter 10 The Criminal Law and Business. Below is a table that highlights the differences between civil law and criminal law:

Chapter 10 The Criminal Law and Business. Below is a table that highlights the differences between civil law and criminal law: Chapter 10 The Criminal Law and Business Below is a table that highlights the differences between civil law and criminal law: Crime a wrong against society proclaimed in a statute and, if committed, punishable

More information

TERMS & CONDITIONS 1. DEFINITIONS 2. AGREEMENT 3. PLACING AN ORDER 4. PRICING AND PAYMENT

TERMS & CONDITIONS 1. DEFINITIONS 2. AGREEMENT 3. PLACING AN ORDER 4. PRICING AND PAYMENT TERMS & CONDITIONS Please read these terms and conditions ("Agreement") carefully: they govern your use of the website www.sunfire-music.com, and/or collaborating partners and associated webshops ( Website

More information

HOW TO VACATE AND EXPUNGE A FELONY CONVICTION

HOW TO VACATE AND EXPUNGE A FELONY CONVICTION HOW TO VACATE AND EXPUNGE A FELONY CONVICTION Introduction to Felony Expungement. 2 Information on House Bill 40 and the requirements for a felony expungement. Step 1: Obtain an Expungement Certification..

More information

MINISTRY OF COMMUNICATIONS AND INFORMATION TECHNOLOGY (Department of Information Technology) NOTIFICATION New Delhi, the 11th April, 2011

MINISTRY OF COMMUNICATIONS AND INFORMATION TECHNOLOGY (Department of Information Technology) NOTIFICATION New Delhi, the 11th April, 2011 MINISTRY OF COMMUNICATIONS AND INFORMATION TECHNOLOGY (Department of Information Technology) NOTIFICATION New Delhi, the 11th April, 2011 G.S.R. 316(E). In exercise of the powers conferred by clause (ca)

More information

Bowie City Police Department - General Orders

Bowie City Police Department - General Orders Bowie City Police Department - General Orders TITLE: VIDEO RECORDING OF POLICE ACTIVITY Activity EFFECTIVE DATE: 4/20/12 NUMBER: 448 REVIEW DATE: X NEW _ AMENDS _ RESCINDS DATE: AUTHORITY Chief John K.

More information

DEFINITIONS. Accuse To bring a formal charge against a person, to the effect that he is guilty of a crime or punishable offense.

DEFINITIONS. Accuse To bring a formal charge against a person, to the effect that he is guilty of a crime or punishable offense. DEFINITIONS Words and Phrases The following words and phrases have the meanings indicated when used in this chapter according to Black s Law Dictionary, common dictionary, and/or are distinctive to law

More information

September 1, 2015 Le 1 er septembre 2015 DISCLOSURE

September 1, 2015 Le 1 er septembre 2015 DISCLOSURE OFFICE OF ATTORNEY GENERAL CABINET DU PROCUREUR GÉNÉRAL PUBLIC PROSECUTIONS OPERATIONAL MANUAL MANUEL DES OPÉRATIONS DE POURSUITES PUBLIQUES TYPE OF DOCUMENT TYPE DE DOCUMENT : Policy Politique CHAPTER

More information

VIDEO RECORDING OF POLICE ACTIVITY. Date Published. By Order of the Police Commissioner

VIDEO RECORDING OF POLICE ACTIVITY. Date Published. By Order of the Police Commissioner General Order J-16 Subject VIDEO ING OF POLICE ACTIVITY Distribution A Date Published 8 November 2011 Page 1 of 7 By Order of the Police Commissioner POLICY It is the policy of the Baltimore Police Department

More information

Template Commission pursuant to Section 11 BDSG

Template Commission pursuant to Section 11 BDSG Template Commission pursuant to Section 11 BDSG Agreement between... - (the Principal ) - and... - (the Agent ) - 1. Subject-matter and duration of the commission Subject-matter of the commission: The

More information

National Report Japan

National Report Japan National Report Takeshi MATSUDA, Megumi OCHI, Tadashi IWASAKI (B) Jurisdictional issues (1)(a) How does your country locate the place of the commission of a crime in cyberspace? Article 1 of the ese Penal

More information

TIPS & STRATEGIES FOR PERFORMING HR INVESTIGATIONS. Presented by Chrys A. Martin

TIPS & STRATEGIES FOR PERFORMING HR INVESTIGATIONS. Presented by Chrys A. Martin TIPS & STRATEGIES FOR PERFORMING HR INVESTIGATIONS Presented by Chrys A. Martin chrysmartin@dwt.com 503-778-5357 Investigation Triggers Harassment/discrimination; Violence; Theft; Drug or Alcohol Abuse;

More information

SEIZURE Effective Date: May 9, 2005

SEIZURE Effective Date: May 9, 2005 SOUTH COAST BRITISH COLUMBIA TRANSPORTATION AUTHORITY POLICE SERVICE SEIZURE Effective Date: May 9, 2005 POLICY 1. Seizure will be undertaken only when clearly authorized by law or with express consent.

More information

NATIONAL INSTRUCTION 2 of 2013 THE MANAGEMENT OF FINGERPRINTS, BODY-PRINTS AND PHOTOGRAPHIC IMAGES

NATIONAL INSTRUCTION 2 of 2013 THE MANAGEMENT OF FINGERPRINTS, BODY-PRINTS AND PHOTOGRAPHIC IMAGES NATIONAL INSTRUCTION 2 of 2013 THE MANAGEMENT OF FINGERPRINTS, BODY-PRINTS AND PHOTOGRAPHIC IMAGES TABLE OF CONTENTS CHAPTER 1: CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER

More information

Code of Practice Issued Under Section 377A of the Proceeds of Crime Act 2002

Code of Practice Issued Under Section 377A of the Proceeds of Crime Act 2002 Code of Practice Issued Under Section 377A of the Proceeds of Crime Act 2002 Presented to Parliament under section 377A(4) of the Proceeds of Crime Act 2002 Code of Practice Issued Under Section 377A

More information

Interstate Commission for Adult Offender Supervision

Interstate Commission for Adult Offender Supervision Interstate Commission for Adult Offender Supervision Privacy Policy Interstate Compact Offender Tracking System Version 3.0 Approved 04/23/2009 Revised on 4/18/2017 1.0 Statement of Purpose The goal of

More information

EXAM TTM2 Information security, advanced. Technical Tools/Aid: None Duration: (3 hours) Contact person: Svein Willassen, ph.

EXAM TTM2 Information security, advanced. Technical Tools/Aid: None Duration: (3 hours) Contact person: Svein Willassen, ph. EXAM TTM2 Information security, advanced Technical Tools/Aid: None Duration: 0900 1200 (3 hours) Contact person: Svein Willassen, ph. 92449678 Part 1 This part consists of 8 questions. Each question can

More information

A REPORT BY THE NEW YORK STATE OFFICE OF THE STATE COMPTROLLER

A REPORT BY THE NEW YORK STATE OFFICE OF THE STATE COMPTROLLER A REPORT BY THE NEW YORK STATE OFFICE OF THE STATE COMPTROLLER Alan G. Hevesi COMPTROLLER DEPARTMENT OF MOTOR VEHICLES CONTROLS OVER THE ISSUANCE OF DRIVER S LICENSES AND NON-DRIVER IDENTIFICATIONS 2001-S-12

More information

FINAL EXAMINATION DIRECTIONS: Write your answers on the ANSWER SHEET provided.

FINAL EXAMINATION DIRECTIONS: Write your answers on the ANSWER SHEET provided. FINAL EXAMINATION DIRECTIONS: Write your answers on the ANSWER SHEET provided. DO NOT MARK ON THIS TEST 1. The security guard/proprietary private security officer s role BEFORE a violation has been committed

More information

Laurel Police Department - General Order Chapter 4, Section 100, Order 115 Video Recording of Police Activity August 12, 2012

Laurel Police Department - General Order Chapter 4, Section 100, Order 115 Video Recording of Police Activity August 12, 2012 4 / 115.05 POLICY It is the policy of this Department to ensure the protection and preservation of every person s Constitutional rights. 4 / 115.10 PURPOSE To set Department re-action guidelines to the

More information

TERMS OF USE. 1. Background

TERMS OF USE. 1. Background TERMS OF USE 1. Background 1.1. www.loconav.com ( Website ) and the LocoNav Application ( App ) is owned, registered and operated by BT Techlabs Private Limited ("Company"), a company incorporated under

More information

Title 17-A: MAINE CRIMINAL CODE

Title 17-A: MAINE CRIMINAL CODE Title 17-A: MAINE CRIMINAL CODE Chapter 18: COMPUTER CRIMES Table of Contents Part 2. SUBSTANTIVE OFFENSES... Section 431. DEFINITIONS... 3 Section 432. CRIMINAL INVASION OF COMPUTER PRIVACY... 4 Section

More information

Frequently Asked Questions for Municipalities LOCAL GOVERNMENT BODIES RECORDS

Frequently Asked Questions for Municipalities LOCAL GOVERNMENT BODIES RECORDS Frequently Asked Questions for Municipalities The Freedom of Information and Protection of Privacy (FOIP) Act aims to strike a balance between the public s right to know and the individual s right to privacy,

More information

END USER LICENSE AGREEMENT. KnowledgePanel - PC

END USER LICENSE AGREEMENT. KnowledgePanel - PC END USER LICENSE AGREEMENT KnowledgePanel - PC 1 End User License Agreement This GfK Custom Research LLC ("GfK") Application End User License Agreement ("Agreement") applies to your use of this GfK Application

More information

Subpart A General Provisions

Subpart A General Provisions Pt. 11 necessitated such an action within 24 hours or sooner if requested by the Deputy Commissioner. In the absence or unavailability of the Deputy Commissioner, the presiding officer shall notify the

More information

The Government of the United States of America and the Government of the Swiss Confederation, hereinafter referred to as "the Contracting Parties";

The Government of the United States of America and the Government of the Swiss Confederation, hereinafter referred to as the Contracting Parties; Draft AGREEMENT BETWEEN THE GOVERNMENT OF THE UNITED STATES OF AMERICA AND THE GOVERNMENT OF THE SWISS CONFEDERATION REGARDING MUTUAL ASSISTANCE BETWEEN THEIR CUSTOMS ADMINISTRATIONS The Government of

More information

SIMON READHEAD Q.C. PRIVACY NOTICE

SIMON READHEAD Q.C. PRIVACY NOTICE SIMON READHEAD Q.C. PRIVACY NOTICE Introduction 1. I am committed to handling your personal information fairly, lawfully and securely in accordance with current data protection laws. This privacy notice

More information

ELUCIDATION OF LAW OF THE REPUBLIC OF INDONESIA NUMBER 8 YEAR 2010 CONCERNING PREVENTION AND ERADICATION THE CRIME OF MONEY LAUNDERING

ELUCIDATION OF LAW OF THE REPUBLIC OF INDONESIA NUMBER 8 YEAR 2010 CONCERNING PREVENTION AND ERADICATION THE CRIME OF MONEY LAUNDERING ELUCIDATION OF LAW OF THE REPUBLIC OF INDONESIA NUMBER 8 YEAR 2010 CONCERNING PREVENTION AND ERADICATION THE CRIME OF MONEY LAUNDERING I. GENERAL In general, the perpetrators endeavor to hide or disguise

More information

Terms of Use Agreement

Terms of Use Agreement Last Updated: April 2, 2018 Terms of Use Agreement The Rate Helpers (collectively The Rate Helpers, we, us, our, or Company ) encourages all users to review this Terms of Use Agreement ( Agreement ). By

More information

CFE CODE OF PROFESSIONAL STANDARDS INTERPRETATION AND GUIDANCE

CFE CODE OF PROFESSIONAL STANDARDS INTERPRETATION AND GUIDANCE CFE CODE OF PROFESSIONAL STANDARDS INTERPRETATION AND GUIDANCE The purpose of this Interpretation and document (the ) is to provide clarification about the CFE Code of Professional Standards (the Standards

More information

TiHo Guidelines for Good Scientific Practice: translation from the German Dec. 2011/Jan. 2012, jmca

TiHo Guidelines for Good Scientific Practice: translation from the German Dec. 2011/Jan. 2012, jmca Guidelines to Safeguard Good Scientific Practice and Measures to Be Taken in Case of Suspicion of Scientific Misconduct at the University of Veterinary Medicine Hannover Not an official announcement! Compilation

More information

Handbook for Strengthening Harmony Between Immigrant Communities and the Edmonton Police Service

Handbook for Strengthening Harmony Between Immigrant Communities and the Edmonton Police Service Handbook for Strengthening Harmony Between Immigrant Communities and the Edmonton Police Service Handbook for Strengthening Harmony This handbook is intended to help you understand the role of policing

More information

Democratic Governance of Policing in Manhattan the Role of Elected Prosecutors. Jessica de Grazia

Democratic Governance of Policing in Manhattan the Role of Elected Prosecutors. Jessica de Grazia Democratic Governance of Policing in Manhattan the Role of Elected Prosecutors by Jessica de Grazia 1. 2011 HMICPS Report on Yorkshire- Humberside CPS Region Despite good governance at Group level there

More information

Security Video Surveillance Policy

Security Video Surveillance Policy Security Video Surveillance Policy Policy Statement The Municipality of Central Elgin (the Municipality) recognizes the need to balance an individual s right to privacy and the need to ensure the safety

More information

OFFICE OF ETHICS, COMPLIANCE AND OVERSIGHT (ECO) INTAKE OVERVIEW AND PROCEDURE

OFFICE OF ETHICS, COMPLIANCE AND OVERSIGHT (ECO) INTAKE OVERVIEW AND PROCEDURE OFFICE OF ETHICS, COMPLIANCE AND OVERSIGHT (ECO) INTAKE OVERVIEW AND PROCEDURE Purpose: This procedure establishes protocols for reviewing and tracking all questions and complaints received by the Office

More information

Chapter 10 The Criminal Law and Business. Two elements must exist at the same time for a person to be convicted of a crime:

Chapter 10 The Criminal Law and Business. Two elements must exist at the same time for a person to be convicted of a crime: Chapter 10 The Criminal Law and Business Criminal Liability Two elements must exist at the same time for a person to be convicted of a crime: 1 the performance of a prohibited act (actus reus) 2 a specified

More information

Why I m here Academic: Law, international studies and policing in Australian and international universities Expert witness in court: Civil: contract,

Why I m here Academic: Law, international studies and policing in Australian and international universities Expert witness in court: Civil: contract, Choosing your Computer Forensic Expert ACFE Asia Pacific Conference Ajoy Ghosh Chief Information Security Office Logica Australia Pty Ltd (now part of CGI) CGI GROUP INC. All rights reserved Why I m here

More information

UACN WHISTLEBLOWING POLICY

UACN WHISTLEBLOWING POLICY UACN WHISTLEBLOWING POLICY JULY 2015 VERSION 2.0 Document approval This document was approved by the Board of UAC of Nigeria PLC on 29 th July 2015 2 Table of Contents 1. Policy Statement..... 4 2. Application.....

More information

CITY OF VANCOUVER BRITISH COLUMBIA

CITY OF VANCOUVER BRITISH COLUMBIA CITY OF VANCOUVER BRITISH COLUMBIA FREEDOM OF INFORMATION AND PROTECTION OF PRIVACY BY-LAW NO. 7364 This By-law is printed under and by authority of the Council of the City of Vancouver (Consolidated for

More information

The Global Economic Crime Survey Cybercrime: are you at risk?

The Global Economic Crime Survey Cybercrime: are you at risk? www.pwc.com/crimesurvey The Global Economic Crime Survey Cybercrime: are you at risk? Hungarian country report December 2011 Table of contents 1) Introduction 3 2) Executive Summary Key findings 4 3) Fraud,

More information

Brussels, 16 May 2006 (Case ) 1. Procedure

Brussels, 16 May 2006 (Case ) 1. Procedure Opinion on the notification for prior checking received from the Data Protection Officer (DPO) of the Council of the European Union regarding the "Decision on the conduct of and procedure for administrative

More information

Policy 5.11 ARREST PROCEDURES

Policy 5.11 ARREST PROCEDURES Cobb County Police Department Policy 5.11 ARREST PROCEDURES Effective Date: November 1, 2017 Issued By: Chief M.J. Register Rescinds: Policy 5.11 (February 1, 2015) Page 1 of 9 The words he, his, him,

More information

Cybercrime in the spotlight

Cybercrime in the spotlight www.pwc.co.za/crimesurvey Cybercrime in the spotlight 6th PwC Global Economic Crime Survey n Edition November 2011 The PwC Global Economic Crime Survey remains the most comprehensive survey of its kind

More information

TERMS OF SERVICE FOR SUPPORT NETWORK COMMUNITY HEART AND STROKE REGISTRY SITE Last Updated: December 2016

TERMS OF SERVICE FOR SUPPORT NETWORK COMMUNITY HEART AND STROKE REGISTRY SITE Last Updated: December 2016 TERMS OF SERVICE FOR SUPPORT NETWORK COMMUNITY HEART AND STROKE REGISTRY SITE Last Updated: December 2016 THIS IS NOT INTENDED TO BE MEDICAL SERVICES. IF YOU HAVE A MEDICAL EMERGENCY, GO TO THE EMERGENCY

More information

Privacy Policy & Terms of Use

Privacy Policy & Terms of Use Town of Ocean Ridge 6450 N Ocean Blvd Ocean Ridge, FL 33435 (561) 732-2635 www.oceanridgeflorida.com Privacy Policy & Terms of Use DISCLAIMER AND TERMS OF USE Thank you for visiting the Official Site of

More information

Georgia Computer System Protection Act

Georgia Computer System Protection Act Georgia Computer System Protection Act Enacted by the 1991 Georgia General Assembly Effective 1 July 1991 INTRODUCTION The "Georgia Computer Systems Protection Act" is an act enacted by the 1991 Georgia

More information

Page 1 of 9 YALE UNIVERSITY POLICE DEPARTMENT CRIME SCENE PROCESSING GENERAL ORDER JUL 2012 ANNUAL

Page 1 of 9 YALE UNIVERSITY POLICE DEPARTMENT CRIME SCENE PROCESSING GENERAL ORDER JUL 2012 ANNUAL Page 1 of 9 YALE UNIVERSITY POLICE DEPARTMENT GENERAL ORDERS Serving with Integrity, Trust, Commitment and Courage Since 1894 ORDER TYPE: NEED TO REFER 413 EFFECTIVE DATE: REVIEW DATE: 25 JUL 2012 ANNUAL

More information

Ownership of Site; Agreement to Terms of Use

Ownership of Site; Agreement to Terms of Use Ownership of Site; Agreement to Terms of Use These Terms and Conditions of Use (the Terms of Use ) apply to the Volta Career Resource Center, being a web site located at www.voltapeople.com (the Site ).

More information

MBTA Transit Police CHAPTER 120. General Order No PAGE 1 OF 8

MBTA Transit Police CHAPTER 120. General Order No PAGE 1 OF 8 MBTA Transit Police DEPARTMENT MANUAL CHAPTER 120 General Order No. 2016-85 SUBJECT STANDARDS OF CONDUCT REFERENCES CALEA 12.2.2, 25.1.1, 26.1.4, 26.1.8, 52.1.1-5, 52.2.2, 52.2.3, 52.2.4, 52.2.6, 52.2.8

More information

DESCHUTES COUNTY ADULT JAIL L. Shane Nelson, Sheriff Jail Operations Approved by: February 9, 2016 CRIMINAL ACTS

DESCHUTES COUNTY ADULT JAIL L. Shane Nelson, Sheriff Jail Operations Approved by: February 9, 2016 CRIMINAL ACTS DESCHUTES COUNTY ADULT JAIL CD-8-17 L. Shane Nelson, Sheriff Jail Operations Approved by: February 9, 2016 CRIMINAL ACTS POLICY. It is the policy of the Deschutes County Corrections Division to report

More information

Policy: Notifiable Data Breach

Policy: Notifiable Data Breach DomaCom Limited Policy: Notifiable Data Breach Version 1.1 June 7, 2018 Author: Sean Crisp Contents 1. Version Control 2 2. Summary 3 3. What is a Data Breach 3 4. Process and Procedure 4 5. Updates to

More information

Subject FIELD INTERVIEWS, INVESTIGATIVE STOPS/DETENTIONS, WEAPONS PAT-DOWNS & SEARCHES. DRAFT 7 April By Order of the Police Commissioner

Subject FIELD INTERVIEWS, INVESTIGATIVE STOPS/DETENTIONS, WEAPONS PAT-DOWNS & SEARCHES. DRAFT 7 April By Order of the Police Commissioner Subject STOPS/DETENTIONS, WEAPONS PAT-DOWNS & Date Published Page DRAFT 7 April 2018 1 of 18 POLICY By Order of the Police Commissioner It is the policy of the Baltimore Police Department (BPD) to conduct

More information

Southern Oregon High-Tech Crimes Task Force Digital Evidence Forensics Laboratory Administrative Policy Manual / Quality Assurance Manual

Southern Oregon High-Tech Crimes Task Force Digital Evidence Forensics Laboratory Administrative Policy Manual / Quality Assurance Manual POLICY 202 Subject: Issuing Authority: Effective Date: Revised: Evidence Retention and Destruction Sergeant Josh Moulin Task Force Commander January 1 st 2009 202.1 PURPOSE AND SCOPE This policy defines

More information

Corporate Counsel June 21, 2018

Corporate Counsel June 21, 2018 2018 Updates and Insights on Recent Employment-Based Immigration Changes Clete P. Samson clete.samson@kutakrock.com Recent Changes for Employees With TPS TPS immigration program that allows FN to remain

More information

Section 66-A Punishment for sending offensive messages through communication service, etc.

Section 66-A Punishment for sending offensive messages through communication service, etc. Section 66-A Punishment for sending offensive messages through communication service, etc. Any person who sends, by means of a computer resource or a communication device,- a) any information that is grossly

More information

Complaint refers to an allegation by an individual that any Department employee has misused authority, acted illegally or unethically.

Complaint refers to an allegation by an individual that any Department employee has misused authority, acted illegally or unethically. University of Wisconsin Madison Police Policy: 52.1 SUBJECT: COMPLAINT INVESTIGATION PROCEDURES EFFECTIVE DATE: 06/01/10 REVISED DATE: 11.07.16 STANDARD: CALEA 52.1.1-52.2.8 IACLEA 4.2.4 4.2.11 WILEAG

More information

Privacy Policy. This Privacy Policy sets out the Law Society's policies in relation to the management of Personal Information.

Privacy Policy. This Privacy Policy sets out the Law Society's policies in relation to the management of Personal Information. Privacy Policy Law Society of South Australia Privacy Policy The Law Society of South Australia (Law Society or we, us or our) deals with information privacy in accordance with the Privacy Act 1988 (Cth)

More information

Internal Oversight Division

Internal Oversight Division E IOD/IM/2017/1 ORIGINAL: ENGLISH DATE: FEBRUARY 28, 2017 Internal Oversight Division Investigation Manual 2017 EDITION page 2 TABLE OF CONTENTS 1. LIST OF ACRONYMS... 4 2. INTRODUCTION... 5 3. DEFINITIONS...

More information

Website Standard Terms and Conditions of Use

Website Standard Terms and Conditions of Use Website Standard Terms and Conditions of Use 1. Acceptance of Terms of Use 2. Modification of Terms 3. Privacy Policy 4. Disclaimers 5. Registration 6. Contributor 7. Limitation of Liability 8. Third Party

More information

MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY

MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY POLICY AND PROCEDURE # 105 SUBJECT: Identity Theft EFFECTIVE DATE: 16 June 2006 PAGE 1 OF 8 REVIEW DATE: 30 November 2017 APPROVED: CHANGE

More information

Emerging Technology and the Fourth Amendment

Emerging Technology and the Fourth Amendment Saber and Scroll Volume 1 Issue 1 Spring 2012 (Edited and Revised April 2015) Article 10 March 2012 Emerging Technology and the Fourth Amendment Kathleen Mitchell Reitmayer American Public University System

More information

EUROPEAN COMMISSION DIRECTORATE-GENERAL JUSTICE. Directorate C: Fundamental rights and Union citizenship Unit C.3: Data protection

EUROPEAN COMMISSION DIRECTORATE-GENERAL JUSTICE. Directorate C: Fundamental rights and Union citizenship Unit C.3: Data protection EUROPEAN COMMISSION DIRECTORATE-GENERAL JUSTICE Directorate C: Fundamental rights and Union citizenship Unit C.3: Data protection Commission Decision C(2010)593 Standard Contractual Clauses (processors)

More information

End User License Agreement

End User License Agreement End User License Agreement Pluribus Networks, Inc.'s ("Pluribus", "we", or "us") software products are designed to provide fabric networking and analytics solutions that simplify operations, reduce operating

More information

Ministry of Citizenship and Immigration. Follow-Up on VFM Section 3.09, 2014 Annual Report RECOMMENDATION STATUS OVERVIEW

Ministry of Citizenship and Immigration. Follow-Up on VFM Section 3.09, 2014 Annual Report RECOMMENDATION STATUS OVERVIEW Chapter 1 Section 1.09 Ministry of Citizenship and Immigration Provincial Nominee Program Follow-Up on VFM Section 3.09, 2014 Annual Report RECOMMENDATION STATUS OVERVIEW # of Status of Actions Recommended

More information

SOFTWARE LICENSE TERMS AND CONDITIONS

SOFTWARE LICENSE TERMS AND CONDITIONS MMS Contract No: SOFTWARE LICENSE TERMS AND CONDITIONS These Software License Terms and Conditions (referred to interchangeably as the Terms and Conditions or the Agreement ) form a legal contract between

More information

Conducting Internal Investigations: Gathering Evidence and Protecting Your Company

Conducting Internal Investigations: Gathering Evidence and Protecting Your Company Conducting Internal Investigations: Gathering Evidence and Protecting Your Company World Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS INTRODUCTION About This

More information

Regulations of Digital Information Processing and Communication (I&C) at the Karlsruhe Institute of Technology (KIT) [I&C Regulations]

Regulations of Digital Information Processing and Communication (I&C) at the Karlsruhe Institute of Technology (KIT) [I&C Regulations] The Regulations of Digital Information Processing and Communication (I&C) at the Karlsruhe Institute of Technology (KIT) [I&C Regulations] ( Ordnung für die digitale Informationsverarbeitung und Kommunikation

More information

Fragomen Privacy Notice

Fragomen Privacy Notice Effective Date: May 14, 2018 Fragomen Privacy Notice Fragomen, Del Rey, Bernsen & Loewy, LLP, Fragomen Global LLP, and our related affiliates and subsidiaries 1 (collectively, Fragomen or "we") want to

More information

DACS DIGITAL PLATFORM LICENCE TERMS AND CONDITIONS 2016

DACS DIGITAL PLATFORM LICENCE TERMS AND CONDITIONS 2016 DACS DIGITAL PLATFORM LICENCE TERMS AND CONDITIONS 2016 1. Definitions and Interpretation 1.1 In this Agreement capitalised terms shall have the meanings ascribed to them in the DACS Platform Licence Term

More information

Computer Search and Seizure

Computer Search and Seizure Computer Search and Seizure National Center For Justice And The Rule Of Law University of Mississippi School of Law Thomas K. Clancy Director www.ncjrl.org Funding! This project is supported by grants

More information

A GUIDE TO POLICE SERVICES IN TORONTO

A GUIDE TO POLICE SERVICES IN TORONTO A GUIDE TO POLICE SERVICES IN TORONTO A GUIDE TO POLICE SERVICES IN TORONTO This booklet is intended to provide information about the police services available in Toronto, how to access police services,

More information

Arizona 2. DRAFT Verified Voting Foundation March 12, 2007 Page 1 of 9

Arizona 2. DRAFT Verified Voting Foundation March 12, 2007 Page 1 of 9 Escrow of Voting System Software As part of an ongoing effort to evaluate transparency in our elections, Verified Voting recently began researching which states require escrow of voting system software

More information

TRUSTEE DUTIES AND RESPONSIBILITIES Robert Hubsher, RCLS

TRUSTEE DUTIES AND RESPONSIBILITIES Robert Hubsher, RCLS TRUSTEE DUTIES AND RESPONSIBILITIES Robert Hubsher, RCLS Based on Handbook for Library Trustees - 2005 Edition and The Mid-Hudson Library System s Across the Board - Roles & Responsibilities - Summer 2008

More information

Legal Ethics of Metadata or Mining for Data About Data

Legal Ethics of Metadata or Mining for Data About Data Legal Ethics of Metadata or Mining for Data About Data Peter L. Ostermiller Attorney at Law 239 South Fifth Street Suite 1800 Louisville, KY 40202 peterlo@ploesq.com www.ploesq.com Overview What is Metadata?

More information

SEARCH AND SEIZURE OF DIGITAL EVIDENCE: THRESHOLDS AND MINEFIELDS

SEARCH AND SEIZURE OF DIGITAL EVIDENCE: THRESHOLDS AND MINEFIELDS PAPER: SEARCH AND SEIZURE OF DIGITAL EVIDENCE: THRESHOLDS AND MINEFIELDS By Justice J. E. (Ted) Scanlan, Justice of the Supreme Court of Nova Scotia and Deputy Judge of the Nunavut Court of Justice Discovery

More information

Protecting Your Privacy

Protecting Your Privacy Protecting Your Privacy 2017 Transparency Report Contents 2 Requests for customer information 3 Number of information requests received, disclosed, rejected and contested 4 Types of disclosure requests

More information

Business Law Chapter 9 Handout

Business Law Chapter 9 Handout Major Differences: 2 Felonies Serious crimes, punishable by Death or prison for more than one (1) year. Misdemeanors Non-serious (petty) crimes punishable by jail for less than one(1) year and/or by fines.

More information

William A. Tanenbaum Co-Head, Technology Transactions. LA / NY / SF / DC / arentfox.com

William A. Tanenbaum Co-Head, Technology Transactions. LA / NY / SF / DC / arentfox.com William A. Tanenbaum Co-Head, Technology Transactions LA / NY / SF / DC / arentfox.com Conflating IP and Subject Matter Definition of Intellectual Property: Intellectual Property means copyrights, patents,

More information

SUPPLIER DATA PROCESSING AGREEMENT

SUPPLIER DATA PROCESSING AGREEMENT SUPPLIER DATA PROCESSING AGREEMENT This Data Protection Agreement ("Agreement"), dated ("Agreement Effective Date") forms part of the ("Principal Agreement") between: [Company name] (hereinafter referred

More information

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute On Proposed Amendments to Rule 41 of the Federal Rules of Criminal Procedure Before The Judicial Conference Advisory

More information

The forensic use of bioinformation: ethical issues

The forensic use of bioinformation: ethical issues The forensic use of bioinformation: ethical issues A guide to the Report 01 The Nuffield Council on Bioethics has published a Report, The forensic use of bioinformation: ethical issues. It considers the

More information

15-6 Investigation Officer Guidelines

15-6 Investigation Officer Guidelines 15-6 Investigation Officer Guidelines 1. PURPOSE: a. This guide is intended to assist investigating officers, who have been appointed under the provisions of Army Regulation (AR) 15-6, in conducting timely,

More information

End-User Agreement for SwissSign Silver Certificates

End-User Agreement for SwissSign Silver Certificates End-User Agreement for SwissSign Silver Certificates of SwissSign AG Beethovenstrasse 49 CH-8002 Zurich Switzerland OID: 2.16.756.1.89.1.3.2.2 Storage: SwissSign-Silver-EUA-09 1/6 Table of Contents 1 General...

More information

When the cartel investigators come calling: Top ten do s, top ten don ts

When the cartel investigators come calling: Top ten do s, top ten don ts When the cartel investigators come calling: Top ten do s, top ten don ts The Crisis A company may first learn that it is involved in an antitrust investigation in the US when federal agents appear at offices

More information

LIFE UNDER PEP COMM I 247D ICE IMMIGRATION HOLD REQUEST ~~~~ I 247N ICE REQUEST FOR NOTIFICATION OF RELEASE ~~~~ I 247X ICE CATCHALL CUSTODY REQUEST

LIFE UNDER PEP COMM I 247D ICE IMMIGRATION HOLD REQUEST ~~~~ I 247N ICE REQUEST FOR NOTIFICATION OF RELEASE ~~~~ I 247X ICE CATCHALL CUSTODY REQUEST LIFE UNDER PEP COMM On November 20, 2014, President Obama announced the end of the much reviled Secure Communities (SComm) program. In its place, DHS created the Priority Enforcement Program or PEP. PEP

More information

Statement on Security & Auditability

Statement on Security & Auditability Statement on Security & Auditability Introduction This document is designed to assist Hart customers by providing key facts and support in preparation for the upcoming November 2016 election cycle. It

More information

DATED DISCIPLINARY RULES AND PROCEDURE AND GRIEVANCE PROCEDURE

DATED DISCIPLINARY RULES AND PROCEDURE AND GRIEVANCE PROCEDURE DATED ------------ DISCIPLINARY RULES AND PROCEDURE AND GRIEVANCE PROCEDURE 1 CONTENTS DISCIPLINARY RULES AND PROCEDURE 1. Policy statement...3 2. Who is covered by the procedure?...3 3. What is covered

More information